[qubes-users] Re: SystemD sucks - qubes shouldn't use it

2017-03-14 Thread cooloutac
On Sunday, March 12, 2017 at 9:16:16 PM UTC-4, Drew White wrote:
> On Saturday, 11 March 2017 05:09:26 UTC+11, cooloutac  wrote:
> > On Friday, March 10, 2017 at 1:14:47 AM UTC-5, Drew White wrote:
> > > On Friday, 10 March 2017 15:36:49 UTC+11, cooloutac  wrote:
> > > > My problem with Qubes is that i'm still noob.  I don't even know what 
> > > > alot of system processes are or what they do. Qubes is more complicated 
> > > > then a normal os even just to monitor network traffic. I'm mostly in 
> > > > the dark compared to on bare metal os.
> > > > 
> > > 
> > > I know more about qubes than the developers do by now.
> > > monitoring is easy, just have a proxy that does it after the netvm.
> > > NetVM -> Firewall/Proxy running WireShark or similar -> AppVM/HVM
> > > 
> > > 
> > > > I'm basically at mercy of a default setup lol.  But I think thats part 
> > > > of qubes goal.  It has the misnomer of being called for nerds or 
> > > > enthusiasts.  But its really for noobs.  The hard part is just taking a 
> > > > step in these waters of a new world, even for most security experts. 
> > > > 
> > > 
> > > I wrote my own applications for qubes because the developers wouldn't fix 
> > > things and didn't change things to use less RAM.
> > > I wrote my own manager that uses only 200 MB VRAM, instead of the current 
> > > one that uses over 1 GB VRAM. (Approximations)
> > > 
> > > Qubes is built for end users, not nerds or developers or anything (or so 
> > > they claimed, will post reference later).
> > > 
> > > > The hard part is just accepting the fact you will be compartmentalizing 
> > > > diff aspects of your daily activity on your pc.  Its a different way of 
> > > > thinking.  
> > > > 
> > > 
> > > it is a different way for many people. Those of us that are like me, and 
> > > are developers and such, we use virtualisation every day just to do our 
> > > jobs.
> > > 
> > > 
> > > > Its about accepting the fact you are never 100% secure and its just a 
> > > > matter of how persistent your assailant is.  No matter what OS you are 
> > > > using. Everyone gets compromised imo, even most security experts.  The 
> > > > only people that don't are people that use their computers like monks.  
> > > > All we can do most of the time is mitigate it.
> > > 
> > > Accept you aren't secure. Accept that you are compromised. Then try your 
> > > best to prevent things from going wrong.
> > > 
> > > It's always good to prevent what you can.
> > > 
> > > I have a way of doing things that permits me to protect myself up the 
> > > wahzoo.
> > > 
> > > More advanced than the way qubes initially did it.
> > > It involves me doing different things with the iptables rules, but it's 
> > > workable.
> > > 
> > > I've done things and tested things, even the vulnerabilities that they 
> > > say there are that makes qubes super duper easy to break, and mine hasn't 
> > > broken or had that vulnerability.
> > > 
> > > Default setups, they can cause issues.
> > > SystemD, issues.
> > > 
> > > Hopefully one day, things will be back to being better, but until then, 
> > > we just have to try to protect ourselves as best as we can. What else can 
> > > we do when people like Google and Microsoft and all those others are 
> > > trying to steal your data and take over your life and your pc and 
> > > everything about you, then sell your data to the everyone
> > 
> > true.   Why not just use wireshark in sys-net, since its considered unsafe 
> > anyways?
>  
> because I keep the data and logs separate. I have a proxyMV with it. That 
> way, I can restrict the VM, and pass everything to something else, thus 
> providing another layer of security by having the data come into the monitor, 
> but go no further. So I can see what's going on, and then release or halt 
> things myself.
> 
> > The problem for me is identifying what vm and what process is causing the 
> > traffic.  To use baremetal methods on every vm is impractical.
>  
> true, but that's where certain things come in handy.
> That's one thing I will look at adding, thanks for the thought.
> 
> > I still never figured out how to make the firewall scripts to control 
> > everything outgoing. I still don't even believe its possible for some 
> > system processes. Sure i've made iptables rules file on baremetal linux no 
> > probs.  But I have to be honest, with Qubes its too complicated for me.
> > 
> 
> It's easy, use the firewall editor for the VMs.
> 
> > another issue for is monitoring hdd activity in similar manner.
> 
> On Dom0, use disk monitoring software.

You can accomplish same thing with sys-net but I guess its more convenient to 
do with a proxyvm, as well for backing it up.

The firewall editor in qubes-manager doesn't block everything, neither would 
the script files, like some qubes system processes.  The whole point for me 
would be to identify and more importantly LOG, ALL traffic with iptables.  I 
know it sounds crazy to some but thats what I have done on

[qubes-users] Re: SystemD sucks - qubes shouldn't use it

2017-03-12 Thread Drew White
On Saturday, 11 March 2017 05:09:26 UTC+11, cooloutac  wrote:
> On Friday, March 10, 2017 at 1:14:47 AM UTC-5, Drew White wrote:
> > On Friday, 10 March 2017 15:36:49 UTC+11, cooloutac  wrote:
> > > My problem with Qubes is that i'm still noob.  I don't even know what 
> > > alot of system processes are or what they do. Qubes is more complicated 
> > > then a normal os even just to monitor network traffic. I'm mostly in the 
> > > dark compared to on bare metal os.
> > > 
> > 
> > I know more about qubes than the developers do by now.
> > monitoring is easy, just have a proxy that does it after the netvm.
> > NetVM -> Firewall/Proxy running WireShark or similar -> AppVM/HVM
> > 
> > 
> > > I'm basically at mercy of a default setup lol.  But I think thats part of 
> > > qubes goal.  It has the misnomer of being called for nerds or 
> > > enthusiasts.  But its really for noobs.  The hard part is just taking a 
> > > step in these waters of a new world, even for most security experts. 
> > > 
> > 
> > I wrote my own applications for qubes because the developers wouldn't fix 
> > things and didn't change things to use less RAM.
> > I wrote my own manager that uses only 200 MB VRAM, instead of the current 
> > one that uses over 1 GB VRAM. (Approximations)
> > 
> > Qubes is built for end users, not nerds or developers or anything (or so 
> > they claimed, will post reference later).
> > 
> > > The hard part is just accepting the fact you will be compartmentalizing 
> > > diff aspects of your daily activity on your pc.  Its a different way of 
> > > thinking.  
> > > 
> > 
> > it is a different way for many people. Those of us that are like me, and 
> > are developers and such, we use virtualisation every day just to do our 
> > jobs.
> > 
> > 
> > > Its about accepting the fact you are never 100% secure and its just a 
> > > matter of how persistent your assailant is.  No matter what OS you are 
> > > using. Everyone gets compromised imo, even most security experts.  The 
> > > only people that don't are people that use their computers like monks.  
> > > All we can do most of the time is mitigate it.
> > 
> > Accept you aren't secure. Accept that you are compromised. Then try your 
> > best to prevent things from going wrong.
> > 
> > It's always good to prevent what you can.
> > 
> > I have a way of doing things that permits me to protect myself up the 
> > wahzoo.
> > 
> > More advanced than the way qubes initially did it.
> > It involves me doing different things with the iptables rules, but it's 
> > workable.
> > 
> > I've done things and tested things, even the vulnerabilities that they say 
> > there are that makes qubes super duper easy to break, and mine hasn't 
> > broken or had that vulnerability.
> > 
> > Default setups, they can cause issues.
> > SystemD, issues.
> > 
> > Hopefully one day, things will be back to being better, but until then, we 
> > just have to try to protect ourselves as best as we can. What else can we 
> > do when people like Google and Microsoft and all those others are trying to 
> > steal your data and take over your life and your pc and everything about 
> > you, then sell your data to the everyone
> 
> true.   Why not just use wireshark in sys-net, since its considered unsafe 
> anyways?
 
because I keep the data and logs separate. I have a proxyMV with it. That way, 
I can restrict the VM, and pass everything to something else, thus providing 
another layer of security by having the data come into the monitor, but go no 
further. So I can see what's going on, and then release or halt things myself.

> The problem for me is identifying what vm and what process is causing the 
> traffic.  To use baremetal methods on every vm is impractical.
 
true, but that's where certain things come in handy.
That's one thing I will look at adding, thanks for the thought.

> I still never figured out how to make the firewall scripts to control 
> everything outgoing. I still don't even believe its possible for some system 
> processes. Sure i've made iptables rules file on baremetal linux no probs.  
> But I have to be honest, with Qubes its too complicated for me.
> 

It's easy, use the firewall editor for the VMs.

> another issue for is monitoring hdd activity in similar manner.

On Dom0, use disk monitoring software.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/01585f73-b385-47bc-ab54-1c82821c358d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: SystemD sucks - qubes shouldn't use it

2017-03-12 Thread Drew White
On Saturday, 11 March 2017 07:35:42 UTC+11, Jean-Philippe Ouellet  wrote:
> On Fri, Mar 10, 2017 at 1:14 AM, Drew White  wrote:
> > I wrote my own applications for qubes because the developers wouldn't fix 
> > things and didn't change things to use less RAM.
> > I wrote my own manager that uses only 200 MB VRAM, instead of the current 
> > one that uses over 1 GB VRAM. (Approximations)
> 
> Feel free to share ;)

Well, I will have to fix it up to make it available.
It's not exactly "end-user" friendly at the moment.

But in the long run, I just may.
It is NOT open-source though.
And many of the things are hard-coded to what I use, so I'd have to build an 
options section for that aspect.

I'll let you know when it's done.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8a8f7d74-48e3-4f3b-91a9-d645e5beb732%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: SystemD sucks - qubes shouldn't use it

2017-03-10 Thread Jean-Philippe Ouellet
On Fri, Mar 10, 2017 at 1:14 AM, Drew White  wrote:
> I wrote my own applications for qubes because the developers wouldn't fix 
> things and didn't change things to use less RAM.
> I wrote my own manager that uses only 200 MB VRAM, instead of the current one 
> that uses over 1 GB VRAM. (Approximations)

Feel free to share ;)

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CABQWM_BaG47E%3DW_pMucBiPux--f-rACY8C-FSX3-N6O-XhsELg%40mail.gmail.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: SystemD sucks - qubes shouldn't use it

2017-03-10 Thread cooloutac
On Friday, March 10, 2017 at 1:14:47 AM UTC-5, Drew White wrote:
> On Friday, 10 March 2017 15:36:49 UTC+11, cooloutac  wrote:
> > My problem with Qubes is that i'm still noob.  I don't even know what alot 
> > of system processes are or what they do. Qubes is more complicated then a 
> > normal os even just to monitor network traffic. I'm mostly in the dark 
> > compared to on bare metal os.
> > 
> 
> I know more about qubes than the developers do by now.
> monitoring is easy, just have a proxy that does it after the netvm.
> NetVM -> Firewall/Proxy running WireShark or similar -> AppVM/HVM
> 
> 
> > I'm basically at mercy of a default setup lol.  But I think thats part of 
> > qubes goal.  It has the misnomer of being called for nerds or enthusiasts.  
> > But its really for noobs.  The hard part is just taking a step in these 
> > waters of a new world, even for most security experts. 
> > 
> 
> I wrote my own applications for qubes because the developers wouldn't fix 
> things and didn't change things to use less RAM.
> I wrote my own manager that uses only 200 MB VRAM, instead of the current one 
> that uses over 1 GB VRAM. (Approximations)
> 
> Qubes is built for end users, not nerds or developers or anything (or so they 
> claimed, will post reference later).
> 
> > The hard part is just accepting the fact you will be compartmentalizing 
> > diff aspects of your daily activity on your pc.  Its a different way of 
> > thinking.  
> > 
> 
> it is a different way for many people. Those of us that are like me, and are 
> developers and such, we use virtualisation every day just to do our jobs.
> 
> 
> > Its about accepting the fact you are never 100% secure and its just a 
> > matter of how persistent your assailant is.  No matter what OS you are 
> > using. Everyone gets compromised imo, even most security experts.  The only 
> > people that don't are people that use their computers like monks.  All we 
> > can do most of the time is mitigate it.
> 
> Accept you aren't secure. Accept that you are compromised. Then try your best 
> to prevent things from going wrong.
> 
> It's always good to prevent what you can.
> 
> I have a way of doing things that permits me to protect myself up the wahzoo.
> 
> More advanced than the way qubes initially did it.
> It involves me doing different things with the iptables rules, but it's 
> workable.
> 
> I've done things and tested things, even the vulnerabilities that they say 
> there are that makes qubes super duper easy to break, and mine hasn't broken 
> or had that vulnerability.
> 
> Default setups, they can cause issues.
> SystemD, issues.
> 
> Hopefully one day, things will be back to being better, but until then, we 
> just have to try to protect ourselves as best as we can. What else can we do 
> when people like Google and Microsoft and all those others are trying to 
> steal your data and take over your life and your pc and everything about you, 
> then sell your data to the everyone

true.   Why not just use wireshark in sys-net, since its considered unsafe 
anyways?

The problem for me is identifying what vm and what process is causing the 
traffic.  To use baremetal methods on every vm is impractical.

I still never figured out how to make the firewall scripts to control 
everything outgoing. I still don't even believe its possible for some system 
processes. Sure i've made iptables rules file on baremetal linux no probs.  But 
I have to be honest, with Qubes its too complicated for me.

another issue for is monitoring hdd activity in similar manner.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/05b01d4e-c901-4f9e-aef5-bdc52e947476%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


Re: [qubes-users] Re: SystemD sucks - qubes shouldn't use it

2017-03-10 Thread Holger Levsen
On Thu, Mar 09, 2017 at 10:06:24PM -0800, Drew White wrote:
> systemd is bad, things were simpler and easier without it.

you think having a 1000 ways to start deamons (written and maintained by
a 1000 people) is more secure and simpler? That's a curious POV…


-- 
cheers,
Holger

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/20170310115029.GA9041%40layer-acht.org.
For more options, visit https://groups.google.com/d/optout.


signature.asc
Description: Digital signature


[qubes-users] Re: SystemD sucks - qubes shouldn't use it

2017-03-09 Thread Drew White
On Friday, 10 March 2017 15:36:49 UTC+11, cooloutac  wrote:
> My problem with Qubes is that i'm still noob.  I don't even know what alot of 
> system processes are or what they do. Qubes is more complicated then a normal 
> os even just to monitor network traffic. I'm mostly in the dark compared to 
> on bare metal os.
> 

I know more about qubes than the developers do by now.
monitoring is easy, just have a proxy that does it after the netvm.
NetVM -> Firewall/Proxy running WireShark or similar -> AppVM/HVM


> I'm basically at mercy of a default setup lol.  But I think thats part of 
> qubes goal.  It has the misnomer of being called for nerds or enthusiasts.  
> But its really for noobs.  The hard part is just taking a step in these 
> waters of a new world, even for most security experts. 
> 

I wrote my own applications for qubes because the developers wouldn't fix 
things and didn't change things to use less RAM.
I wrote my own manager that uses only 200 MB VRAM, instead of the current one 
that uses over 1 GB VRAM. (Approximations)

Qubes is built for end users, not nerds or developers or anything (or so they 
claimed, will post reference later).

> The hard part is just accepting the fact you will be compartmentalizing diff 
> aspects of your daily activity on your pc.  Its a different way of thinking.  
> 

it is a different way for many people. Those of us that are like me, and are 
developers and such, we use virtualisation every day just to do our jobs.


> Its about accepting the fact you are never 100% secure and its just a matter 
> of how persistent your assailant is.  No matter what OS you are using. 
> Everyone gets compromised imo, even most security experts.  The only people 
> that don't are people that use their computers like monks.  All we can do 
> most of the time is mitigate it.

Accept you aren't secure. Accept that you are compromised. Then try your best 
to prevent things from going wrong.

It's always good to prevent what you can.

I have a way of doing things that permits me to protect myself up the wahzoo.

More advanced than the way qubes initially did it.
It involves me doing different things with the iptables rules, but it's 
workable.

I've done things and tested things, even the vulnerabilities that they say 
there are that makes qubes super duper easy to break, and mine hasn't broken or 
had that vulnerability.

Default setups, they can cause issues.
SystemD, issues.

Hopefully one day, things will be back to being better, but until then, we just 
have to try to protect ourselves as best as we can. What else can we do when 
people like Google and Microsoft and all those others are trying to steal your 
data and take over your life and your pc and everything about you, then sell 
your data to the everyone

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b3d7f916-2422-4d2e-8cc0-e2536a261e54%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: SystemD sucks - qubes shouldn't use it

2017-03-09 Thread Drew White
On Friday, 10 March 2017 15:25:26 UTC+11, cooloutac  wrote:
> Well I'm just a layman but from my little experience i prefer systemd cause 
> its easier to handle running system processes. but from bootup time 
> standpoint it seems to make no diff.
> 

systemd is bad, things were simpler and easier without it.


> I dunno what it is. I started linux with fedora but itseems it started to get 
> super buggy after fedora19 to the point I switched to debian and ignored the 
> false extra security I thought it gave me.  I felt like a bigger target using 
> it for some reason.
> 

fedora 19, when they started to bring in systemd on a persons choice?
or was it compulsory by then and no choice?

> I thought problems were due to switch to dnf which just made updates 
> unbearable as if some sick joke on fedora users.  but all sorts of baremetal 
> problems with it.  maybe it was the change to systemd? or Kernels keep 
> getting worse? More people using linux but they don't really use it? lol I 
> dunno I started on Fedora 14 ir 15 not sure when it got systemd actually. 
> Debian is stable and quiet. I made the switch debian.  arch can be real 
> lighweight and less buggy but has same kernel probs as fedora. They similar 
> in ways.  fedora 22 was nail in coffin for me.   Its like let me put a target 
> on my forehead with the word dumb and a bullseye.  One good thing it gets 
> updates super fast.  Alot of qubes user complaints areabout poor support for 
> cutting edge hardware.  Think thats reason qubes uses fedora.  I'd rather 
> fedora then ubuntu lmao...
> 

I'd rather slackware because it has no systemd, other than that I use CentOS 5, 
and some early 6 with the less crap that they changed in it. fedora is a day0 
attack heaven. super vulnerable. not to mention systemd makes it even more 
vulnerable.

> I use to use slackopuppy it was great, talk about lightweight. and fully 
> functional. security conscious too.

never tried it. I'll have to take a look.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9f3ffb26-6703-4f2a-9fa5-63da6b8ea483%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: SystemD sucks - qubes shouldn't use it

2017-03-09 Thread cooloutac
My problem with Qubes is that i'm still noob.  I don't even know what alot of 
system processes are or what they do. Qubes is more complicated then a normal 
os even just to monitor network traffic. I'm mostly in the dark compared to on 
bare metal os.

I'm basically at mercy of a default setup lol.  But I think thats part of qubes 
goal.  It has the misnomer of being called for nerds or enthusiasts.  But its 
really for noobs.  The hard part is just taking a step in these waters of a new 
world, even for most security experts. 

The hard part is just accepting the fact you will be compartmentalizing diff 
aspects of your daily activity on your pc.  Its a different way of thinking.  

Its about accepting the fact you are never 100% secure and its just a matter of 
how persistent your assailant is.  No matter what OS you are using. Everyone 
gets compromised imo, even most security experts.  The only people that don't 
are people that use their computers like monks.  All we can do most of the time 
is mitigate it.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/e0382a19-52bf-418e-a4cb-645e2319a138%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: SystemD sucks - qubes shouldn't use it

2017-03-09 Thread cooloutac
Well I'm just a layman but from my little experience i prefer systemd cause its 
easier to handle running system processes. but from bootup time standpoint it 
seems to make no diff.

I dunno what it is. I started linux with fedora but itseems it started to get 
super buggy after fedora19 to the point I switched to debian and ignored the 
false extra security I thought it gave me.  I felt like a bigger target using 
it for some reason.

I thought problems were due to switch to dnf which just made updates unbearable 
as if some sick joke on fedora users.  but all sorts of baremetal problems with 
it.  maybe it was the change to systemd? or Kernels keep getting worse? More 
people using linux but they don't really use it? lol I dunno I started on 
Fedora 14 ir 15 not sure when it got systemd actually. Debian is stable and 
quiet. I made the switch debian.  arch can be real lighweight and less buggy 
but has same kernel probs as fedora. They similar in ways.  fedora 22 was nail 
in coffin for me.   Its like let me put a target on my forehead with the word 
dumb and a bullseye.  One good thing it gets updates super fast.  Alot of qubes 
user complaints areabout poor support for cutting edge hardware.  Think thats 
reason qubes uses fedora.  I'd rather fedora then ubuntu lmao...

I use to use slackopuppy it was great, talk about lightweight. and fully 
functional. security conscious too.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/fe62f407-f6f1-4ef0-afaf-c30c1d3648ea%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: SystemD sucks - qubes shouldn't use it

2017-03-09 Thread Drew White
On Thursday, 9 March 2017 00:51:06 UTC+11, tai...@gmx.com  wrote:
> I realize that it is an integral part of fedora and debian (gross), but 
> it is a serious security hole and qubes should consider migrating away 
> from it by maybe choosing another orgin distro.
> http://without-systemd.org/wiki/index.php/Arguments_against_systemd
> 
> https://muchweb.me/systemd-nsa-attempt
> "The Linux kernel, I believe, is clean. As long as Linus lives, you're 
> not going to subvert the kernel. Let's just assume that is true for the 
> sake of argument. If you can't get into the kernel, what is your next 
> option? You need something low level (PID 1?), ubiquitous, and vast in 
> scope and complexity.
> 
> This describes systemd perfectly. It was almost like it was designed to 
> touch as much of a Linux system as possible. It has hooks into some many 
> different subsystems and APIs that it's almost impossible to build a 
> modern distro with current software without pulling in systemd as a 
> dependency. This happened almost overnight, and I think there are 
> malicious forces at work here."
> 
> Assuming that it is the NSA is unimaginative, it could be literally be 
> any combination of interests that are doing this - who wouldn't desire 
> absolute control and absolute power over 99% of linux systems?
> 
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=761658
> I am tired of the "virtualization will protect you!" excuse, it only 
> goes so far and some systemD issues such as using google DNS by default 
> are simply inexcusable from a qubes perspective (designed to be a secure 
> OS, but phoning home like that without asking isn't secure at all)
> 
> Linux is about choice, but now the incompetent lennart and red hat are 
> choosing for you - they are more qualified to make that decision and are 
> doing it for your own good.

I'm currently in the middle of getting Qubes to work on Slackware, i.e. no 
systemd.

It's taking a bit of time to get everything right though, but I believe that in 
the end, it will be fully functional.

The only reason it's taking so long is because the Qubes Developers don't know 
the answers to the questions that I asked regarding Qubes. It's either that or 
they just refuse to answer to protect something that's open-source.

As far as I know, slackware will never be using systemd. This is the reason why 
I am doing it.

Someone ages ago said they would be building a template for slackware 
integrated, but that didn't go anywhere beyond that as far as they had posted. 
So, I started doing it myself.

Soon, there will be a MORE SECURE version of Qubes available, and all updates 
still coming from qubes-developers themselves, or else it may have to be an 
off-branch version if their coding doesn't allow for non-systemd in the future.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/0de248d0-5b24-4b63-a3dd-109883552751%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.


[qubes-users] Re: SystemD sucks - qubes shouldn't use it

2017-03-08 Thread Daniel Moerner
On Wednesday, March 8, 2017 at 8:51:06 AM UTC-5, tai...@gmx.com wrote:
> I realize that it is an integral part of fedora and debian (gross), but 
> it is a serious security hole and qubes should consider migrating away 
> from it by maybe choosing another orgin distro.

It would be helpful for you to make clear what exactly in that pile of links is 
a threat to Qubes.

More generally, I think you significantly underestimate the benefits Qubes 
receives from integration with established distributions. These distributions 
have more users, more developers, better infrastructure, etc. All of this 
contributes to security, and the infrastructure is particularly important when 
it comes to trusting the distributions you use for your templates. The 
alternative distributions have much smaller userbases. The same holds true for 
systemd alternatives. How long will OpenRC, or sinit, or uinit, or the latest 
new proposed replacement be supported? Even if systemd has some problems, I 
think the benefits we get from Fedora and Debian outweigh the costs.

Daniel

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/5dcbbd15-2974-4500-9c92-4997d9367d0d%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.